Webcast on SQL Auditing

For a great webcast on SQL Auditing, check out Database Security: Challenges & Solutions by Ayad Shammout, the Lead Technical DBA at Caregroup Healthcare (Harvard Hospitals) at http://www.brighttalk.com/webcasts/3755/attend   Description Organizations across the globe are being inundated with regulatory requirements.  They also have a storng need to better manage their IT systems to ensure they are operating efficiently and stayign secure.  Auditing is a critical component from the standpoint of regulatory compliance, and ensuring data security and privacy is a big challenge.  In the focus of this presentation, we will look on how to implement a defence-in-depth strategy that can…

Rate this:

Reaching Compliance: SQL Server 2008 Compliance Guide

Organizations across the globe are being inundated with regulatory requirements. They also have a strong need to better manage their IT systems to ensure they are operating efficiently and staying secure. Microsoft is often asked to provide guidance and technology to assist organizations struggling with compliance. The SQL Server 2008 Compliance Guidance white paper was written to help organizations and individuals understand how to use the features of the Microsoft® SQL Server® 2008 database software to address their compliance needs. This paper serves as an accompaniment to the SQL Server 2008 compliance software development kit (SDK), which provides sample code…

Rate this:

Analyzing Data while Protecting Privacy – A Differential Privacy Case Study

Abstract Analysis and sharing of aggregate data (e.g., number of users whose favorite color is blue) is crucial to understanding patterns of the population being studied. The problem is that even summary data can expose the individuals who make up this information. Therefore, we are studying the use of privacy preserving data analysis techniques that will protect the individual and allow analysts to understand general trends. We believe that while there are unique perturbations of the data with these techniques, analysts will be able to use the data and protect the users at the same time. The case study involves…

Rate this: